XiangShan Nanhu V2 and XiangShan Kunmighu V3 were discovered to use speculative execution and indirect branch prediction, allowing attackers to access sensitive information via side-channel analysis of the data cache.
References
| Link | Resource |
|---|---|
| https://github.com/necst/aca25-xiangshan-spectre | Exploit Third Party Advisory |
| https://github.com/necst/aca25-xiangshan-spectre/blob/main/README.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
02 Jan 2026, 21:23
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/necst/aca25-xiangshan-spectre - Exploit, Third Party Advisory | |
| References | () https://github.com/necst/aca25-xiangshan-spectre/blob/main/README.md - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:a:xiangshan:xiangshan:2.0:*:*:*:*:*:*:* cpe:2.3:a:xiangshan:xiangshan:3.0:*:*:*:*:*:*:* |
|
| First Time |
Xiangshan xiangshan
Xiangshan |
18 Dec 2025, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| CWE | CWE-200 CWE-203 |
10 Dec 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-10 18:16
Updated : 2026-01-02 21:23
NVD link : CVE-2025-63094
Mitre link : CVE-2025-63094
CVE.ORG link : CVE-2025-63094
JSON object : View
Products Affected
xiangshan
- xiangshan
